Home
last modified time | relevance | path

Searched refs:VMM (Results 1 – 14 of 14) sorted by relevance

/linux-6.3-rc2/drivers/gpu/drm/nouveau/nvkm/subdev/mmu/
A Dvmm.h286 #define VMM_MAP_ITER(VMM,PT,PTEI,PTEN,MAP,FILL,BASE,SIZE,NEXT) do { \ argument
300 VMM_SPAM(VMM, "ITER %08x %08x PTE(s)", PTEI, (u32)_ptes); \
302 FILL(VMM, PT, PTEI, _ptes, MAP, _addr); \
309 #define VMM_MAP_ITER_MEM(VMM,PT,PTEI,PTEN,MAP,FILL) \ argument
310 VMM_MAP_ITER(VMM,PT,PTEI,PTEN,MAP,FILL, \
314 #define VMM_MAP_ITER_DMA(VMM,PT,PTEI,PTEN,MAP,FILL) \ argument
315 VMM_MAP_ITER(VMM,PT,PTEI,PTEN,MAP,FILL, \
317 #define VMM_MAP_ITER_SGL(VMM,PT,PTEI,PTEN,MAP,FILL) \ argument
318 VMM_MAP_ITER(VMM,PT,PTEI,PTEN,MAP,FILL, \
/linux-6.3-rc2/Documentation/admin-guide/hw-vuln/
A Dcross-thread-rsb.rst14 thread. However, KVM does allow a VMM to prevent exiting guest mode when
86 attempts to transition out of C0. A VMM can use the KVM_CAP_X86_DISABLE_EXITS
A Dmultihit.rst39 Privileged software, including OS and virtual machine managers (VMM), are in
/linux-6.3-rc2/Documentation/x86/
A Dintel_txt.rst46 Trusted Boot (tboot) is an open source, pre-kernel/VMM module that
48 kernel/VMM.
54 Tboot currently supports launching Xen (open source VMM/hypervisor
A Dsva.rst246 ENQCMD can be used from within a guest VM. In these cases, the VMM helps
/linux-6.3-rc2/Documentation/virt/kvm/devices/
A Dvcpu.rst225 From the source VMM process:
237 From the destination VMM process:
/linux-6.3-rc2/drivers/virtio/
A DKconfig57 drivers over PCI. This requires that your VMM has appropriate PCI
/linux-6.3-rc2/Documentation/networking/device_drivers/ethernet/intel/
A Dfm10k.rst125 KVM Hypervisor/VMM supports direct assignment of a PCIe device to a VM. This
A Dixgbe.rst540 Linux KVM Hypervisor/VMM supports direct assignment of a PCIe device to a VM.
/linux-6.3-rc2/security/
A DKconfig106 confidence that their hardware is running the VMM or kernel that
/linux-6.3-rc2/Documentation/virt/hyperv/
A Doverview.rst11 encompass both the hypervisor and the VMM service without making a
/linux-6.3-rc2/Documentation/virt/kvm/x86/
A Damd-memory-encryption.rst370 After completion of SEND_START, but before SEND_FINISH, the source VMM can issue the
/linux-6.3-rc2/Documentation/virt/kvm/
A Dapi.rst7066 instead of KVM_CREATE_IRQCHIP if the userspace VMM wishes to emulate the
7447 KVM_CAP_SGX_ATTRIBUTE enables a userspace VMM to grant a VM access to one or
7505 VMM before creating any VCPUs to allow the guest access. Note that MTE is only
7511 hibernation of the host; however the VMM needs to manually save/restore the
7519 When enabled the VMM may make use of the ``KVM_ARM_MTE_COPY_TAGS`` ioctl to
7534 upgrading the VMM process without interrupting the guest.
7660 When userspace sets KVM_X86_NOTIFY_VMEXIT_ENABLED bit in args[0], VMM will
8160 the dirty bitmap should be the very last thing that the VMM does before
8161 considering the state as complete. VMM needs to ensure that the dirty
8228 specifically enabled (by the guest making the hypercall, causing the VMM
[all …]
/linux-6.3-rc2/arch/x86/
A DKconfig895 some attacks from the VMM.

Completed in 31 milliseconds